T Level DPDD Core Paper 2

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/98

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

99 Terms

1
New cards

The Total harmonic distortion

(THD)

2
New cards

Access rights

Control over which user has access to a digital system, folders, files and data/information.

3
New cards

Accounts payable

Money that is paid out by the organisation.

4
New cards

Accounts receivable

Money that is coming into the organisation.

5
New cards

Active cooling

Using fans to reduce the heat of computer components.

6
New cards

Active matrix

Controls each pixel using capacitors. This enables the pixels to change colour and brightness more rapidly.

7
New cards

Active sensors

Sensors requiring an external signal or a power signal.

8
New cards

Agency worker

A person who has a contract with an agency but works temporarily for someone who hires them.

9
New cards

Analogue sensors

Produce a continuous output signal relating to the quantity being measured.

10
New cards

Application Specific Integrated Circuit (ASIC)

A microchip designed for special applications such as a handheld computer.

11
New cards

Automated teller machine (ATM)

A special computer that allows a bank account holder to manage their account.

12
New cards

Backbone networks

The part of a network that combines different networks into a single complete network. The backbone carries the bulk of the network traffic.

13
New cards

Big data

Very large data sets that can be analysed to produce information such as trends and patterns. Big data cannot be analysed using traditional analysis data tools.

14
New cards

Bottleneck

Limitation of data flow by network resources.

15
New cards

Bus topology

All nodes are connected directly to a central cable that runs up and down the network - this cable is known as the backbone. Data is sent up and down the backbone until it reaches the correct node.

16
New cards

Capital

The money or assets owned by a person or organisation and used as investments to make more money.

17
New cards

Cathode Ray Tube (CRT)

A vacuum tube containing an electron gun at one end and a fluorescent screen at the other end.

18
New cards

Chargeback

A payment amount that is returned to the debit or credit card of a customer after they successfully dispute a transaction or return a purchased item. The chargeback can be initiated by the seller or the customer's bank. Sellers are often charged a fee from the card issuer when a chargeback occurs.

19
New cards

Contingency time

Time built into the schedule for a project which can be used in case of any unforeseen issues, problems or events.

20
New cards

Cyber security

The practice of defending computers, servers, mobile devices, electronic systems, networks and data from malicious attacks.

21
New cards

Dark Net

Networks that are not indexed by search engines. They are only available to a select group of people with authorisation, specific software and configurations.

22
New cards

Data

Raw facts and figures before they have been processed.

23
New cards

Data at rest

Data stored on a digital device or storage medium.

24
New cards

Data cleaning

The process of going through data looking for errors and correcting them, or excluding data where errors have been located.

25
New cards

Data encryption software

Software that is used to encrypt a file or data.

26
New cards

Data in transit

Data being sent to one or more authorised users.

27
New cards

Data Over Cable Service Interface Specification (DOCSIS)

A globally recognised telecommunications standard. It supports high-bandwidth data transfer via existing coaxial cable systems that were originally used for the transmission of cable television programme signals (CATVS).

28
New cards

Data packets

Small units of data which are sent and received when accessing the internet or any other type of network.

29
New cards

Data silos

A group of raw data accessible by one department but not available to the other departments within the organisation.

30
New cards

Data sprawl

The vast amounts and variety of data produced by organisations on a daily basis.

31
New cards

Data striping

The technique used to store consecutive segments of data (e.g. a file) on different physical storage devices.

32
New cards

Data subject

The person the data is being held about.

33
New cards

Data transfer protocol (DRP)

The technique used to store consecutive segments of data (e.g. a file) on different physical storage devices.

34
New cards

Data virtualisation

Connects all types of data sources regardless of the file types and locations. The data is then combined, and users can access the combined data through reports, mobile apps, websites, dashboards and portals.

35
New cards

Data visualisation

The graphical representation of data.

36
New cards

DBMS

database management system.

37
New cards

Dependent tasks

Tasks which cannot be started until a previous, specified task has been completed.

38
New cards

Digital sensors

Work with discrete digital data. The digital data is used for conversion and transmission.

39
New cards

Developmental

The development of someone, something or even both.

40
New cards

Distributed denial of service (DDoS)

When a network is flooded with so much traffic that it cannot operate or communicate as required.

41
New cards

Encapsulation

Information is taken from a higher level and a header is added to it, treating the higher layer information as data. The IP packet is then encapsulated into a Layer 2

42
New cards

Ethernet frame.

The frame is then converted into bits at Layer 1 and sent across the local network.

43
New cards

Encryption code/key

A set of characters, a phrase or numbers that are used when encrypting or decrypting data or a file.

44
New cards

End user

A consumer of a product and/or service. This does not only apply to customers/clients but also to employees.

45
New cards

Ethical hacking

An alternative term for penetration testing.

46
New cards

External bus

Also known as an external bus interface (EBI) or expansion bus. It is a type of data bus that enables external devices and components to connect with a computer.

47
New cards

External stakeholders

Groups outside an organisation, for example shareholders.

48
New cards

Facial recognition software

Software that can identify or confirm someone's identity using their face in a photo, video or in real time.

49
New cards

Field Programmable Gate Array (FPGA)

An integrated hardware circuit that can be programmed to carry out one or more logical operations. Uses include the rear viewing cameras on cars, data analytics, encryption, compression and Artificial Intelligence (e.g. within deep neural networks).

50
New cards

Filter noise

Noise is unwanted electrical or electromagnetic energy that degrades the quality of signals and data. It occurs in digital (and analogue) systems. It can affect files and communications including, text, images, audio and so on. The filter part is finding it and getting rid of it (or at least reducing it).

51
New cards

Firmware

Code, added at the time of manufacturing, written to a hardware device's non-volatile memory. It is the software that allows the hardware to run.

52
New cards

Frequency response

The measurement rate of the highs and lows of the sounds produced by a speaker.

53
New cards

Function keys

Arranged in a row at the top of the keyboard, they are assigned a unique meaning and used for a specific purpose.

54
New cards

Hacker

A person who uses computers to gain unauthorised access to data.

55
New cards

Haptics

Using technology to stimulate the senses of touch and motion to reproduce the sensations that would be felt by someone interacting directly with the physical object.

56
New cards

Hash

A number generated from a string of text.

57
New cards

Hops

Refers to the number of routers that a packet passes through from its source to its destination. A hop can also be counted when a packet passes through other hardware on a network such as switches, access points and repeaters. It is dependent on what role the devices have on the network and their configuration.

58
New cards

Hypervisor

Software that creates and runs virtual machines (VMs). A hypervisor, which is sometimes referred to as a virtual machine monitor (VMM), isolates the hypervisor operating system and resources from the virtual machines. This allows it to create and manage the VMs.

59
New cards

Injection flaws

Allow attackers to relay malicious code through an application to another system.

60
New cards

Internal stakeholders

Groups within an organisation, for example owners and employees.

61
New cards

Internet Protocol (IP)

The string of numbers an ISP assigns a device.

62
New cards

IP spoofing

Changing a packet's source IP address to impersonate another computer system, or to hide the identity of the sender, or both.

63
New cards

Inventory

Consists of finished products and assets owned by an organisation or used by an organisation to carry out production.

64
New cards

Jitter

When there is a time delay in the sending of data packets over a network.

65
New cards

Limited Liability Partnership (LLP)

A company owned by two or more people. Each person pays tax on their share of the profits but is not personally liable for any debts the company cannot pay.

66
New cards

Media Access Control (MAC)

This is a code which is in the device's Network Interface Card (NIC), identifying the physical device.

67
New cards

Middleware

Software which is 'in the middle' of the operating system and the applications working on it. It allows communication and data management for distributed applications by operating as a hidden translation. It is used to link two separate applications together.

68
New cards

Milestones

Specific points during a project used to make sure it is on-track. A milestone has no time allocated and usually occurs at the end of a critical part of the project. It is usually shown as a diamond shape on a Gantt chart.

69
New cards

Mineral oil cooling

Computer components are submerged in mineral oil. Heat generated by the components is transferred to the mineral oil at a better rate than air. The mineral oil dissipates the heat.

70
New cards

Mitigate

If you mitigate against something, you take steps to reduce the likelihood of it happening, or to reduce its impact if it does happen.

71
New cards

Node

A connection point in a network that can receive, send, create or store data. Each node requires some form of identification to receive access, such as an IP address. Examples of nodes are computers, printers, routers and switches.

72
New cards

Operational intelligence

Data analysis that enables decisions and actions to be made in business operations based on real-time data as it is generated and collected. The data analysis process is automated and the results are integrated into operational systems for immediate use by the managerial staff and other relevant employees.

73
New cards

Opt in

Means a person has to take a specific positive step, for example tick a box, send an email or click a button or icon, to say they consent to receiving marketing.

74
New cards

Opt out

Means a person must take a positive step to refuse or unsubscribe from marketing.

75
New cards

Outage

A period when the power, a service or equipment is closed down.

76
New cards

Packet

A small segment of a larger message. Data that is sent over computer networks is divided into packets. The packets are combined by the computer/device that is receiving the message.

77
New cards

Packet loss

When one or more packets fail to reach the intended destination.

78
New cards

Parity

A technique that checks whether any data has been lost or overwritten when it is moved from one storage place to another or transmitted between computers on a system.

79
New cards

Passive cooling

The cooling of computer components by slowing the speed at which the component is operating.

80
New cards

Passive matrix

Uses a grid of vertical and horizontal wires to display an image on the screen. Each pixel is controlled by an intersection of two wires in the grid. When the electrical charge is altered at a given intersection, the colour and brightness of the corresponding pixel can be changed. Passive matrix is relatively simple and inexpensive to produce, but the disadvantage is that the charge of two wires (vertical and horizontal) must be changed in order to change just one pixel. The response time is therefore slow. Fast movement may appear blurry or faded.

81
New cards

Passive sensors

Do not require external power signals and directly generate an output response.

82
New cards

Peer/peering

The arrangement of traffic between Internet Service Providers (ISPs). The large ISPs which have their own backbone networks allow traffic from other large ISPs in exchange for traffic to be allowed on their backbones. In addition, they exchange traffic with the smaller ISPs so that regional end points can be reached.

83
New cards

Performance metrics

The process for the collection, analysis and reporting of information with respect to the performance of a component, system, organisation, department or individual.

84
New cards

Permissions

A list of attributes that determine what a user can do with files and folders, for example read, write, edit or delete.

85
New cards

Platform agnostic

Where software is able to work on all devices and can operate across a variety of operating platforms.

86
New cards

Radio frequency identification (RFID)

Tiny chips that contain information which is transmitted when near a receiver.

87
New cards

Rate latency

The amount of time (delay) it takes to send information from one point to the next.

88
New cards

Read performance

The time taken to open a file from storage.

89
New cards

Redundant/redundancy

Where a system is still able to function regardless of issues that may occur.

90
New cards

Runtime

The length of time a computer program takes to run.

91
New cards

Serial/concurrent tasks

Tasks which can be completed at the same time.

92
New cards

Stakeholder

Anyone with an interest in a business or organisation. Stakeholders can be individuals, groups or other organisations, or businesses that are affected by the organisation's activity. They can include customers, suppliers, employees, communities, government and even the ecosystem.

93
New cards

Stock

Consists of finished products, parts and materials which are sold to customers.

94
New cards

Thin Film Transistor (TFT)

Used in high-quality flat display LCDs. There is a transistor for each pixel on the screen allowing the electrical current that illuminates the display to turn on and off at a faster rate. This makes the display brighter and motion smoother.

95
New cards

Time to live (TTL)

The amount of time or 'hops' that a packet is set to exist inside a network before being discarded by the router. TTL is also used in Content Delivery Network (CDN) caching and Domain Name System (DNS) caching.

96
New cards

Total harmonic distortion (THD)

The amount of distortion created by the signal amplification.

97
New cards

Transformational

Producing a change or improvement in a situation.

98
New cards

Transitional

The transition (movement) from one position, stage, state or concept to another.

99
New cards

Video random access memory (VRAM)

A known as a dual-ported memory. It is an expensive form of RAM which has the capability to perform reads and writes simultaneously. VRAM can also be accessed by two devices at the same time and is commonly used to increase the speed of video cards.